Virus Textfiles

Virii programs came into play in the 1980's in full force and to this day turn every online binary transfer into a potential hazard. Well, maybe that's not entirely true, but you wouldn't know it from the hype and hysteria bred in the world. Meanwhile, fascinating artistic studies of the programming of Virii exist out there and will be brought here. As a rule, I don't include Virus Source Code, since that's just programming, and boring as all hell. if there's a discussion or writing about how to make virii, I include that. This is the arbitrariness of the host.

If you're looking for the excellent 40HEX Virus Magazine, it's located in the Magazines section.

Description of the Textfile
DOCUMENTATIONDocumentation for Different Viruses and Programs
NCSANCSA Virus Reports
800-5.txt 82314
A Guide to the Selection of Anti-Virus Tools and Techniques, by W.T. Polk and L.E. Basshan, December 1992
abaittut.txt 14720
Information on the "Anti-Bait" Method of Virus Transmission
adebgtut.txt 15848
Anti-Debugger Techniques by The Master Hides Behind the Mask
agents.txt 36769
McAfee Associates Agent Listing (February 23, 1993)
allvirus.vir 22209
PC Virus Listing, by Jim Goodwin, 1989
allvirusdf.vir 30897
Slightly Updated Version of Jim Goodwin's List.
amigvir1.txt 3314
A History of the Amiga Viruses, by Paul M. of POISON Cracking Association
amigvir2.txt 6144
A History of the Amiga Viruses by Ed Earing
amigvir3.txt 1920
The Amiga IRQ Virus: It's Out! (December 28, 1988)
anaco001.txt 16048
ANACONDA #001: The Official VIPER Electronic Mag by Viral Inclined Programming Experts Ring
apply.yam 4117
APPLICATION: Youths Against McAfee
arcvnews01.txt 56065
ARCV: The Association of Really Cruel Viruses Newsletter
armag911.txt 2594
The 911 Virus, Disassembly and Commentary by Black Wolf
atari101.txt 54379
Viruses 101: Chapter 1
avcr-01.001 3088
Amateur Virus Creation Research Group Magazine: Introduction
avcr-01.002 39187
Amateur Virus Creation Research Group Magazine: The New DS-512 Virus
avcr-01.003 3223
Amateur Virus Creation Research Group Magazine: Nuking, by Thimble
avcr-01.004 3605
Amateur Virus Creation Research Group Magazine: The Whore Virus
avcr-01.005 24313
Amateur Virus Creation Research Group Magazine: the AMI Virus
avcr-01.006 7359
Amateur Virus Creation Research Group Magazine: An Introduction to ASM
avcr-01.007 21995
Amateur Virus Creation Research Group Magazine: Research of the Air Cop Virus, by Security Threat
avcr-01.008 22344
Amateur Virus Creation Research Group Magazine: Research of the Wigger Virus, by Security Threat
avcr-01.009 2881
Amateur Virus Creation Research Group Magazine: Analysis of Connie
avcr-01.010 3392
Amateur Virus Creation Research Group Magazine: OhhLala Virus
avcr-01.011 4612
Amateur Virus Creation Research Group Magazine: Twister Virus
avcr-01.012 2892
Amateur Virus Creation Research Group Magazine: Vlamix 1.0
avirus.txt 4458
Overview of Some Amiga Viruses
backdoor.txt 6512
Information About Backdoors and MS-DOS and BIOS That Can Be Used by Viruses, by Qark of VLAD
baitdet.txt 6722
Advanced Bait Detection by CoKe of VLAD
batvirus.txt 668
Creating a Batch File Virus
bbinterv.iew 21652
Anatomy of a Virus Author: A Biography of the Black Baron by Matthew Probert
bdinterv.iew 18873
Interview with A Virus Writer named Blode by The Unforgiven
bedtime.nfo 4338
NFO: The Bedtime Virus, by Youngsters Against McAfee (November 16, 1992)
blckbook.txt 24240
The little Black Book of Computer Viruses Volume One: The Basic Technology by Mark A. Ludwig (1991)
bluenine.nfo 9706
A Technical Discussion About the Blue Nine Virus by Conzouler (November 19, 1994)
braininf.vir 4577
Information on the Brain Virus And Variants
bulgfact.txt 57241
The Bulgarian and Soviet Virus Factories by Vesselin Bontchev, Director of Laboratory of Computer Virology, Bulgarian Academy of Sciences, Sofia, Bulgaria
bulgfactdoc.vir 57241
The Bulgarian and Soviet Virus Factories
catvir.txt 10223
How to write a virus program, by the Cheshire Cat
ccinterv.iew 8675
Interview with Crom-Cruach of Trident
chaos.nfo 3677
INFO: The Viral Collector's Kit #1 by The Knights of Chaos (February 4, 1995)
cmvs-1.v1 37357
ViriiSearch: The Virus Research Newsletter Volume 1 Number 1
cmvs-2.v1 60096
ViriiSearch: The Virus Research Newsletter Volume 1 Number 2 (July 2, 1992)
cmvs-3.v1 59651
ViriiSearch: The Virus Research Newsletter Volume 1 Number 3 (August 2, 1992)
cnws2000.vir 14585
Computer Virus Research and Information Service Index
cnws2001.vir 17995
Computer Virus Research and Information Service #1
cnws2002.vir 3036
Computer Virus Research and Information Service #2
cnws2003.vir 5457
Computer Virus Research and Information Service #3
cnws2004.vir 44383
Computer Virus Research and Information Service #4
cnws2005.vir 49238
Computer Virus Research and Information Service #5
cnws2006.vir 8975
Computer Virus Research and Information Service #6
cnws2007.vir 8956
Computer Virus Research and Information Service #7
cnws2008.vir 91748
Computer Virus Research and Information Service #8
comp.vir 8320
The USENET Virus: A Cautionary Tale by Peter de Silva (April 20, 1990)
cpi-1.txt 20245
Corrupted Programming International Newsletter #1 by Doctor Dissector (June 30, 1989)
cpi-2.txt 99461
Corrupted Programming International Newsletter Issue #2
cpi1.vir 24305
CPI Newsletter Volume #1, 1989
cpi2.vir 98758
CPI Newsletter Volume #2
cpivirus.txt 23568
Corrupted Programming Internation #1: Computer Viruses, a Protagonist's Point of View by Doctor Dissector (June 27, 1989)
cpivirus2.txt 90571
Corrupted Programming International #2 by Doctor Dissector: Trojan Horses and Virii: A Protagonist's Point of View (July 27, 1989)
crcrevue.vir 55986
Comparison: Products to Detect Changes to Programs
cri-cri.txt 1309
Cri-Cri Virus, Found on S3-Trio64 Chinese Windows 3.1 Setup disk
csvir87.vir 4771
CompuServe Magazine's Virus History Timeline: 1987
csvir88.vir 103572
CompuServe Magazine's Virus History Timeline: 1988
csvir89.vir 69893
CompuServe Magazine's Virus History Timeline: 1989
cvirs.101 10112
C VIRUS 101: An Introduction to Viruses in C
cvm.txt 23552
Computer Virus Myths by Rob Rosenberger with Ross Greenberg
datut001.txt 8220
Scan Strings, How They Work, and How to Avoid Them, by Dark Angel
datut002.txt 9941
An introduction to Nonoverwriting Virii by Dark Angel
datut003.txt 14844
An introduction to Nonoverwriting Virii II: EXE Infectors, by Dark Angel
datut004.txt 18463
An Introduction to Nonoverwriting Virii III: SYS Infectors by Dark Angel
datut005.txt 6571
Code Optimization: A Beginner's Guide by Dark Angel
datut006.txt 10873
Advanced Polymorphism Primer by Dark Angel
datut007.txt 8171
SFT's and Their Usage, by Dark Angel
datut008.txt 17676
EXE Self-Disinfection by Dark Angel
datut009.txt 11690
Boot Infectors by Dark Angel
datut010.txt 5910
UMB Residency by Dark Angel
desc.sdi 444
NFO: The Smeg Virus Construction Kit
deth001.rot 4661
Megadeth's Guide to Virus Researching Part I by Megadeth of .ROTing [DeTH]
dhcivwar.txt 2206
Relationship Chart of the Civil War and Related Viruses by TridenT (1993)
dhinterv.iew 8668
Interview with Dark Helmet of Trident
diogenesdoc.vir 3217
Diogenes 2.0 Documentation and User Manual
dirstlth.txt 6061
Directory Stealth Techniques of Viruses (FCB)
drkfib01.txt 3524
Virus Writers Reply to the SCAN.EXE Program
enigma.asm 18797
DISASSEMBLY: The Enigma Virus
european.txt 19456
List of Known Viruses in the UK, by Joe Hirst of the British Computer Virus Research Centre
eval.vir 26111
Anti-Viral Product Evaluation
fester.vir 10122
Festering Hate: A Description of an Apple II Virus, by the Bowen Arrow
firefly.txt 19617
The Firefly Virus, by Nikedamus
fish.vir 9382
Thoughts on the Fish Virus
fndint21.txt 12608
Finding INT 21's Real Address Using the PSP by Satan's Little Helper
fog.txt 17483
FOG: A Polymorphic Encription Algorithm by Eclipse
fullstlt.txt 10033
A Full Stealth or Disinfection on Open by Blonde of Immortal Riot
funbot2.cvp 3190
How the Boot Sequence Operates, Relevant to Virus Infection
funbot3.cvp 3465
How the Boot Sequence Operates Relevant to Viral Infection, Part II.
fungen1.cvp 2792
Computer Operations and Viral Operations
fungen2.cvp 2721
Viral operations: How Viruses Function
fungen3.cvp 2672
How Viruses Use Operating Systems
fungen4.cvp 2629
How Viruses Hide in System Layers
fungen5.cvp 2939
How Viruses are Activated
fungen6.cvp 2679
How to Detect Changes made by a Virus
fungen7.cvp 2716
Checking Files for Viruses
fungen8.cvp 3033
Checking Files for Viruses, Part II
fungen9.cvp 2664
Checking the System Files for Viruses
fungena.cvp 2766
How Viruses Avoid Detection
funpiv1.cvp 2542
Viruses that Affect and Infect Files
funpiv2.cvp 2375
Viruses and how they Insert Themselves
funpiv3.cvp 2529
How to Add a Virus to a Program
funpiv4.cvp 2895
Viral Code "Association"
funpiv5.cvp 2872
Variations of Computer Virus Infection
g2.txt 25600
Phalcon/Skism's G^2 Version 0,70: The Second Generation of Virus Creation by Dark Angel (January 1, 1993)
gao_rpt 106252
The General Accounting Office Report on Computer Viruses, 1988
gf.txt 1966
Information and BBS List for General Failure, a H/P/A/V/C Oriented Computer Organization
glath.vir 21116
Computer Viruses: A Rational View, By Dr. Raymond Glath
gold-bug.txt 9373
Analysis of the Gold Bug Virus
goodwin.txt 137805
An Analysis of Computer Virus Structures (April 7, 1989)
greetng1.txt 3202
NFO: The Grretings Virus by Youngsters Against McAfee (January 2, 1993)
guardian.bbs 29058
The Guardian Lists: An Abbreviated Trojan Alert List Issue #1 (November 12, 1989)
guardian.vir 53823
The Guardian List, Issue #1, Sept. 25, 1989
hackmisc.9 9303
Hacked/Miscellaneous Dangerous Files, #9
hate.txt 1540
BBS AD: The Immortal Hate BBS
hatedetect.vir 5984
Program to Detect the Festering Hate or CyberAIDS Apple II Virus, by Tom Weishaasr (July, 1988)
hitler.a86 39241
The HITLER virus: commented in a rough 'n' ready way by the Crypt Newsletter staff for issue #11, January 1993
hormones.vir 19584
Net Hormones: Infection Control using Cooperation among Computers
hr5061.vir 2309
The text of H.R. 5061
hysteria.vir 18748
Virus Hysteria! By Richard B. Levin
ibmpaper.vir 87040
Coping with Computer Viruses and Related Problems
identify.txt 20602
Developing Virus Identification Products, by Tim Sankary, 1989
illegal.nfo 2083
NFO: Illegality, the Unstoppable Crime Machine (November 12, 1994)
implemen.mca 42307
Implementing Anti-Viral Programs, by John McAfee 1989
index.mag 1201
Index to SLAM Magazine Issue #1 (January 1997)
int_10.not 4217
An Introduction to the INT-10 Virus, by Padgett
intro1.cvp 2475
Introduction to the Computer Virual Programs Column
ivm-95.1 146968
Immortal Virus Magazine Issue #95.1
jeru-b.asm 42115
DISASSEMBLY: The Jerusalem B Virus
jeru-dc.vir 3328
Analysis of the Jerusalem DC Virus
jtinterv.iew 17375
INTERVIEW: John Tardy of Trident in The Netherlands
jvvirus.txt 42968
Jerusalem B Virus Source Code
killhead.vir 959
Virus Source Code that Destroys the Disk Head
killmnk3.doc 11975
Monkey and Int_10 Virus Detector and Remover Version 3.0 by Tim Martin (1993)
levine.pap 13323
Potential Virus Attack by L. P. Levine
lminterv.iew 54289
The Faces Behind the Masks by Sara Gordon (November 1994)
locprst.txt 32002
Excerpt from "The Virus Creation Labs: A Journey Into the Underground": A Preist Deploys His Satanic Minions
ltlmess.slt 4005
The Little Mess Spawning Virus Source from Crom-Cruach of Trident (1992)
lzinterv.iew 20100
INTERVIEW: Lord Zero, Virus Writer
macv.txt 24130
How to Write a Virus for the Macintosh, or How I Learned To Stop Worrying And Love The Resource Manager
malmsey.txt 4058
Information on the Malmsey Virus (October, 1992)
mayhem.txt 1384
Mayhem at Firms Plagued by Virus, by Philip Braund of The Mirror, transcribed by Phantasm (March 7th, 1992)
mbfamily.txt 6942
The Mayberry Family of Virus by HypoDermic
mbinterv.iew 13793
INTERVIEW: Metabolis of VLAD (Virus Writing Group)
mcaffvirus.txt 7075
Virus Characteristics, by McAfee Virus Scanning
mdef.inf 4864
The MDEF Macintosh Virus, by Tom Young of Cornell Information Technologies
melissa.txt 13926
The Melissa Macro Virus, a Report Prepared by Robert M. Slade
memres.txt 7779
Some Information on Memory Residence Methods for Viruses
michael.asm 6969
DISASSEMBLY: Michelangelo Virus
michangl.txt 6840
The Michaelangelo Virus Source Code
mk-chart.txt 1835
A Virus Relationship Chart of Masud Khafir's Viruses
mkinterv.iew 12153
INTERVIEW: Masud Khafir of Trident
mkvirlst.txt 17466
A List of Viruses Written by Masud Khafir of Trident
monkey.not 6279
Information on the MONKEY.A and MONKEY.B Virus Variants (February 1992)
n8fall.txt 10007
Information on the N8FALL Virus (February 1995)
necro.a86 22069
Source code for the Necro, A.k.a. "Skull" Virus
net.hor 19511
Net Hormones: Part 1 - Infection Control assuming Cooperation among Computers
newinstl.txt 1472
Installation Instructions for Nowhere Man's Virus Creation Library v1.00
nist01.txt 5761
Columbus Day Virus: Press Release by Jan Kosko Sept. 22, 1989
nist02.txt 4238
Columbus Day Virus: A Fact Sheet
offspr82.txt 1470
DOCUMEN#TATION: Offspring v0.82 by Virogen (September 6, 1993)
p1.txt 10934
Attack of the Computer Virus, By Lee Dembart
pcblkjck.txt 4608
Features of Blackjack Virus (PC) (January 24, 1989)
peacevir.vir 2573
Computer Virus Hits Again (The Peace Virus)
ph-vir1.txt 19794
Dark Angel's Phunky Virus Writing Guide #1
pngintrv.iew 9876
INTERVIEW: Persona No Grata of Trident in The Netherlands
polyflag.txt 18411
A Humble PolyMorphic Engine Primer by Absolute Overlord
polymorf.txt 31851
Post Discovery Strategies: Hiding Your Virus After Discovery, by Sepultura
polymorph.txt 17432
Post Discovery Strategies: Hiding Your Virus After Discovery, by Sepultura
polymrph.txt 14524
Polymorphic Viruses Escape Detection but Get Our Attention
polyvir.txt 6299
Computer Virus Catalog 1.2: Dedicated Virus (31-January 1992)
popscia86.vir 4472
Popoolar Science virus - a very simple overwriting infector
portexec.txt 9293
Infection of Portable Executables by Qark and Quantum of VLAD
pro.txt 4009
F-Secure Anti-Virus Availability and BBS List
ps-vir1.txt 19801
Dark Angel's Phunky Virus Writing Guide (Part 1)
ps-vir2.txt 29546
Dark Angel's Phunky Virus Writing Guide (Part 2) The Replicator
ps-vir3.txt 20133
Dark Angel's Phunky Virus Writing Guide (Part 3) Non-Resident Virii, Part II
ps-vir4.txt 22970
Dark Angel's Phunky Virus Writing Guide (Part 4) Resident Virii, Part I
ps-vir5.txt 20131
Dark Angel's Phunky Virus Writing Guide (Part 5) Resident Viruses, Part II
ps_vir1.vir 19865
Phalcon Skism, Part I
ps_vir2.vir 29617
Phalcon Skism, Part II
ps_vir3.vir 20204
Phalcon Skism, Part III
ps_vir4.vir 23041
Phalcon Skism, Part IV
qkinterv.iew 15053
INTERVIEW: Qark of Virus Labs and Distribution (VLAD) by The Unforgiven
rab_mem.apl 3110
APPLICATION to Join RABID by ProTurbo of RABID (1991)
ratboy-1.txt 12067
RatBoy's Overwriting Virus Tutorial
ratboy-2.txt 15758
RatBoy's Overwriting Virus Tutorial Part II
readlist.vir 12800
An abbreviated bibliography for computer viruses
resist.txt 29417
Resist! Further Virus Strategies by Mouth of Sauron
rjinterv.iew 31156
An Interactive Interview with Virus-Writer Rajaat of Genesis
robin.hod 6655
Viruses and System Security (a story)
rstut001.txt 13765
Disinfecting an Infected File by Rock Steady of NuKE
rstut002.txt 9350
TSR COM Infections by Rock Steady of NuKE
rstut003.txt 7782
Constructing Kit on Infecting .COM by Rock Steady of NuKE
rstut004.txt 20142
Infection on Closing by Rock Steady of NuKE
rstut005.txt 13378
EXE Infections Part I: Infection Process, by Rock Steady of NuKE
rstut006.txt 7572
EXE Infectors Part II by Rock Steady of NuKE
rstut007.txt 11905
Directory Stealth by Rock Steady of NuKE
rstut008.txt 7273
Directory Stealth Method 2 by Rock Steady of NuKE
rstut009.txt 5350
Memory Stealth by Rock Steady NuKE
rstut010.txt 28965
The Dangers of Thunderbytes TBClean Emulation Techniques by Rock Steady of NuKE (August, 1993)
rumors.txt 9250
Rumors of Worms and Trojan Horses: Danger Lurking in the Public Domain, by Mike Guffey
rvlatn1.vir 48324
Revelation, a Virus E-Zine, Vol. 1 Issue 1
samson.vir 5642
Samson's PC Virus List
scitzo.nfo 1954
Virus Spotlight: The Scitzo Virus
sdwlnd02.ans 3788
ANSI BBS AD: Shadowland BBS
six_byte.pad 17377
Six Bytes for Virus Detection in the MS-DOS Envrionment, by Padgett Peterson, 3/29/1991
smallvir.txt 3568
The Smallest Virus I Could Manage (263 Bytes)
span02.vir 1735
You can't release the Worm source code, says SPAN
stealth.txt 3798
Elusive New Viruses Can Avoid Detection by Dennis Flanders
steroid.vir 2304
Discussion of a Trojan Horse program called "Steroid"
stoned-b.txt 10898
The Stoned-B Virus
stoned1.vir 3392
To Remove the Marijuana (Stoned) Virus from HD 9105
An Explanation of how the Stoned Virus operates by Mike Lawrie
stormbrg.rt1 2158
A Goodbye from Stormbringer of Phalcon/Skism From the World of Viruses
stormbrg.rt2 1554
A Goodbye from Stormbringer of Phalcon/Skism From the World of Viruses (Part II) (1995)
tag.ans 14090
ANSI BBS AD: The Adventures of Guild
talons01.txt 5850
Some Background on PuKE: An Introduction from TLN
talons02.txt 28869
The True Story about Talon by Talon of NUKE (April, 1994)
talons03.txt 2293
An Incredibly Complicated Tale of Mystery and Intrigue
talontut.txt 7844
Information About Mulipartite Infection of Viruses
tdoc1.txt 14961
Documentation for a Virtual Mouse Drive That's a Virus, by Seth Comstock (August 1993)
tdoc2.txt 5179
Documentation for a Story Program That's Actually a Virus, (1993)
troj.hac 4652
Lots of warnings about EGABTR.EXE
troj.txt 7528
Other warnings for other random virus programs
trojan.vir 9191
How someone's BBS got whacked with Viruses in 1984
tsrtut.txt 4484
A Documentation on Creating TSR Viruses
tuinterv.iew 6820
Intervue with TU About Virus Creation
universa.mol 13613
A universal Detection Model by Chris Ruhl and James Molini
usavirus.vir 2175
Supposed use of a computer virus during Desert Storm
v101pt1 14746
Virus 101 - Chapter 1 by George Woodside (March 1, 1989)
v101pt2 18596
Virus 101 - Chapter 2 by George Woodside (March 6, 1989)
v101pt3 19444
Virus 101 - Chapter 3, by George Woodside (March 13, 1989)
v101pt4 5845
Virus 101 - Chapter 4 by Gordon Meyer (March 30, 1989)
varicell.txt 5474
The Varicella Virus Source Codes, by Rock Steady
vdetect.vir 13696
A Universal Virus Detection Model by Chris Ruhl and James Molini
verify_r.txt 24830
Virus Verification and Removal -- Tools and Techniques by David M. Chess, Nov. 18, 1991
vguide.txt 21135
Computer Viruses: A Rational View by Raymond M. Glath
vi900906.txt 187667
Fidonet Message Base Disucssing Viruses (Summer 1990)
vi901029.txt 181138
Fidonet Message Base Disucssing Viruses (Summer 1990)
vir-1.v1 37205
ViriiSearch: The Virus Research Newsletter Volume 1 Issue 1
vir-2.v1 60027
ViriiSearch: The Virus Research Newsletter Volume 1 Issue 2 (July 2, 1992)
vir-3.v1 59654
ViriiSearch: The Virus Research Newsletter Volume 1 Issue 3 (August 2, 1992)
vir.txt 19800
Dark Angel's Phunky Virus Writing Guide
vir2.txt 29557
Dark Angel's Phunky Virus Writing Guide Installment II
virbillfax.vir 4169
NCSA Testimony on Virus Bills, 1990
virethic.txt 13124
Establishing Ethics in the Computer Virus Arena by Paul W. Ferguson, Jr. (September 1992)
virii.txt 17712
What You Should Know About Computer Viruses by BlenderHead
viris03.txt 7208
Some of the Less Known Viruses (Humor)
virpgm01.txt 12883
Virus Programming Basics Issue #1
virpgm02.txt 23762
Virus Programming Basics Issue #2: Not So Basic
virs.vir 11931
Discussions about the Jerusalem B Virus
virukpc.txt 13056
Known PC Viruses in the UK and their effects, by Dr. Alan Solomon, 1989
virus 5314
Virus Attack! By Rick Arnold
virus-al.ert 2065
Local Area Virus Update, Bay Area - Sacramento, 21 Sep, 1989
virus.1 1821
Virus Discussion on a BBS
virus.kie 32573
The Infection of PC Compatible Computers by Stephen E. Kiel and Raymond K. Lee of the Georgia Institute of Technology
virus.txt 5160
Comparison between Mcaffe's SCAN.EXE (3-25-92) and F-PROT.EXE (4-5-92) by The Researcher and Scan Man
virus1.dna 17710
What You Should Know about Computer Viruses by Blinderhead
virus1.vir 4223
Report on the DATACRIME Virus
virus101.vir 58631
Viruses 101: A Information Set
virus101001.vir 13796
Virus 101 Chapter 1
virus101002.vir 17548
Virus 101 Chapter 2
virus101003.vir 18347
Virus 101 Chapter 3
virus101004.vir 4971
Virus 101 Chapter 4
virus2.txt 11729
The Virus Informer: Your Weekly Virus Newsletter by Mark E. Bishop
virus3.txt 7585
The Virus Informer by Mark E. Bishop: The Macintosh Virus
virus4.txt 4268
The Virus Informer Chapter 4: The Engine That Kills
virus5.txt 49830
The Virus Informer Chapter 5: The Virus List
virus6.txt 1729
The Virus Informer Chapter 7: The Virus Informer Fax Bulletin Service
virus7.txt 1762
The Virus Informer by Mark E. Bishop Chapter 7: Next Week
virus_my.ths 27085
Computer Virus Myths, by Rob Rosenberger (1988-1992)
virus_st.whm 16646
A New Stategy for Computer Viruses by William H. Murray
virusbas.vir 1338
An example of a Virus in BASIC
virusbib.txt 4480
Bibliography for Computer Viruses, by Ted Landberg, 02/24/1988
virusbro.vir 9856
Computer Viruses and Trojan Horses; A Guide to Protecting Yourself
virusdet.txt 50981
Virus Detection Alternatives, by Patrick Min
virusdoc.vir 205175
The Computer Virus Epidemic, 1987-1991. Article Compilation 10368
How to write a Virus Program, by The Cheshire Cat
viruses.txt 3123
Safe Telecommunicating may be your Best Protection against Viruses, by Micharl Fischer, A+ Magazine, August 1988
viruses.uss 20740
Viruses in the USSR by Eldar A. Musaev
virusfaq.txt 84745
FAQ: VIUS-L/comp.virus Frequently Asked Questions (November 18, 1992)
virusinf.vir 9216
A Suggested Readings List for Computer Viruses by Jon Mack
virusl.vir 1887
The Virus Informer, Issue #6
virusone.vir 4323
The Virus Informer, Issue #1
virussum.doc 558766
Virus Information Summary List, March 17, 1991, by Patricia M. Hoffman
virussum.txt 607049
The Virus Information Summary List, April 20, 1991 by Patricia M. Hoffman
virusx.txt 14142
Information on VirusX by Steve Tibbet, as well as a list of Amiga Viruses
vlab102.vir 19999
Viral Lab 102, May 1994
wininf01.txt 25224
Windows Executable Infection by Qark and Quantum of VLAD
wininf02.txt 13444
Calling the Windows API in Assembly Language by Qark of VLAD
wordmacro.txt 86611
FAQ: The MS Word 6.x Macro Viruses FAQ v2.0
xyz.txt 3424
Information on the XYZ (Examine Your Zipper) Virus (January, 1994)
yam-ivp.nfo 3769
NFO: The Instant Virus Production Kit by Youngsters Against McAfee (June 12, 1992)
yetiser_ 15345
Polymorphic Viruses: Implementation, Detection, and Protection by VDS Advanced Research Group/Tarkan Yetiser 1993

There are 301 files for a total of 7,050,152 bytes.
There are 2 directories.

If you wish to have the entire directory conveniently archived and compressed into one file, please download either virus.tar.gz (2426657 bytes) or (2772458 bytes) instead of all the files separately.